Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |   

Category:   Device (Router/Bridge/Hub)  >   Juniper Junos Vendors:   Juniper
Juniper Junos TCP Reassembly Algorithm Lets Remote Users Consume Excessive CPU Resources on the Target System
SecurityTracker Alert ID:  1041434
SecurityTracker URL:
CVE Reference:   CVE-2018-5390   (Links to External Site)
Date:  Aug 8 2018
Impact:   Denial of service via network
Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Juniper Junos. A remote user can consume excessive CPU resources on the target system.

The system uses an inefficient TCP reassembly algorithm. A remote user can send specially crafted data via an established TCP connection to consume excessive CPU resources on the target routing engine running Junos.

The following platforms are affected:

MX Series (MX80, MX480 tested)
QFX Series (QFX5100, QFX5200, QFX10008 tested)
NFX Series (NFX150, NFX250 tested)
PTX Series (PTX10008 tested)
vMX, vSRX, vQFX, vPTX, ...

Other platforms may be affected.

Juha-Matti Tilli (Aalto University, Department of Communications and Networking / Nokia Bell Labs) reported this vulnerability.

Impact:   A remote user can consume excessive CPU resources on the target system.
Solution:   The vendor has issued an advisory. Some workarounds are described in the advisory.

The vendor advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Resource error

Message History:   None.

 Source Message Contents


[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search

Content previously copyright LLC placed in the public domain on December 31, 2019.